Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

55,122 Full-Text Articles 71,866 Authors 23,107,612 Downloads 376 Institutions

All Articles in Computer Sciences

Faceted Search

55,122 full-text articles. Page 883 of 2005.

Autonomous Systems With Reuse: A Survey On The State-Of-The-Practice, Denny LaVerne Hood III 2019 WVU

Autonomous Systems With Reuse: A Survey On The State-Of-The-Practice, Denny Laverne Hood Iii

Graduate Theses, Dissertations, and Problem Reports

This problem report presents the results of an anonymous online survey that was used to collect information about software systems that use model-based software engineering, contain autonomy and where software reuse plays an important role. Recent advancements in computation ability and the emergence of decision-making algorithms have increased interest in and use of autonomy in applications areas such as aeronautics, automotive, military, and space industries. In these application domains, autonomy is used to reduce costs, reduce reaction times, and improve performance. Due to the emerging nature of autonomy, very little research has been done regarding the level of autonomy of …


The Use Of Deep Learning Distributed Representations In The Identification Of Abusive Text, Susan McKeever, hao chen, Sarah Jane Delany 2019 Technological University Dublin

The Use Of Deep Learning Distributed Representations In The Identification Of Abusive Text, Susan Mckeever, Hao Chen, Sarah Jane Delany

Conference papers

The selection of optimal feature representations is a critical step in the use of machine learning in text classification. Traditional features (e.g. bag of words and n-grams) have dominated for decades, but in the past five years, the use of learned distributed representations has become increasingly common. In this paper, we summarise and present a categorisation of the stateof-the-art distributed representation techniques, including word and sentence embedding models. We carry out an empirical analysis of the performance of the various feature representations using the scenario of detecting abusive comments. We compare classification accuracies across a range of off-the-shelf embedding models …


Absorption Calculator: A Cross-Platform Application For Portable Data Analysis, AnnMarie Kolbl 2019 The University of Akron

Absorption Calculator: A Cross-Platform Application For Portable Data Analysis, Annmarie Kolbl

Williams Honors College, Honors Research Projects

Traditional spectrometers are expensive and non-portable, making them inaccessible to the public. This application will be used in conjunction with spectrometer hardware developed by Erie Open Systems. The hardware itself is 3D printed and, in addition to being portable, enables data to be collected easily. The purpose of this project is to create a cross-platform application capable of reading the output from the spectrometer hardware, calculating the absorbance levels of the sample against the control, and recording the data in tables stored on the cloud. The end result will be an application that runs on iOS and Android, and is …


Timing Is Everything: Temporal Dynamics Of Brain Activity Using The Human Connectome Project, Francesca LoFaro 2019 University of Puget Sound

Timing Is Everything: Temporal Dynamics Of Brain Activity Using The Human Connectome Project, Francesca Lofaro

Summer Research

Most neuroimaging studies produce snapshots of brain activity. The goal of this project is to examine the temporal dynamics of how these areas interact through time, using fear as a case study to assess how regions involved in fear interact. Working with Matlab computer code, I sort through the large fMRI dataset known as the Human Connectome Project to extract neuroimaging data from patients with different NIH Toolbox Fear-Somatic survey scores to assess the temporal dynamics between brain regions. The results will allow an understanding beyond which areas are involved, and instead will provide a picture of how these areas …


Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr 2019 Walden University

Strategizing Effective Succession Planning For Information Technology Executives, Michael Barr

Walden Dissertations and Doctoral Studies

Organizations across the United States lose hundreds of millions of dollars each year due to the lack of effective succession planning for information technology executives. The purpose of this single case study was to explore strategies for the development and implementation of effective succession plans for future information technology executives. Bass and Avolio's transformational leadership theory was the conceptual framework for this study. The 3 participants were selected based upon their roles as executives in technology-related positions and their experiences with succession planning. Data were collected using semistructured interviews with these executives from a company headquartered in Kansas City, Missouri. …


Managing Security Objectives For Effective Organizational Performance Information Security Management, Ramamohan Gutta 2019 Walden University

Managing Security Objectives For Effective Organizational Performance Information Security Management, Ramamohan Gutta

Walden Dissertations and Doctoral Studies

Information is a significant asset to organizations, and a data breach from a cyberattack harms reputations and may result in a massive financial loss. Many senior managers lack the competencies to implement an enterprise risk management system and align organizational resources such as people, processes, and technology to prevent cyberattacks on enterprise assets. The purpose of this Delphi study was to explore how the managerial competencies for information security and risk management senior managers help in managing security objectives and practices to mitigate security risks. The National Institute of Standards and Technology framework served as the foundation for this study. …


Strategies For Cloud Services Adoption In Saudi Arabia, Wessam Hussein Abdulghani Mahmoud 2019 Walden University

Strategies For Cloud Services Adoption In Saudi Arabia, Wessam Hussein Abdulghani Mahmoud

Walden Dissertations and Doctoral Studies

The adoption rate of cloud computing is low among business organizations in Saudi Arabia, despite the cost-€saving benefits of using cloud services. The purpose of this multiple case study was to explore the strategies that information technology (IT) leaders in the manufacturing industry in Saudi Arabia used to adopt cloud computing to reduce IT costs. The target population of this study consisted of 5 IT leaders from 5 different manufacturing companies in Saudi Arabia who successfully adopted cloud computing in their companies to reduce IT costs. Rogers's diffusion of innovation theory was the conceptual framework for this research. Data collected …


Project Managers’ Communication Strategies For Team Collaboration In Software Development, John Rubena Wani 2019 Walden University

Project Managers’ Communication Strategies For Team Collaboration In Software Development, John Rubena Wani

Walden Dissertations and Doctoral Studies

Effective communication among team members in software development projects is increasingly significant for the success of the project. Successful software projects are the catalyst for achieving profitability objectives and creating shareholder value in organizations. The purpose of this single case study was to investigate communication strategies information technology (IT) project managers used for successful team collaboration in software development. The population for this study comprised senior IT project managers. The project managers had supervision responsibilities from a midsized IT company in Alberta, Canada. The sociotechnical theory guided this study as the conceptual framework. Data were collected from semistructured interviews with …


Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood 2019 Walden University

Exploring Firm-Level Cloud Adoption And Diffusion, William J. Wood

Walden Dissertations and Doctoral Studies

Cloud computing innovation adoption literature has primarily focused on individuals, small businesses, and nonprofit organizations. The functional linkage between cloud adoption and diffusion is instrumental toward understanding enterprise firm-level adoption. The purpose of this qualitative collective case study was to explore strategies used by information technology (IT) executives to make advantageous enterprise cloud adoption and diffusion decisions. This study was guided by an integrated diffusion of innovation and technology, organization, and environment conceptual framework to capture and model this complex, multifaceted problem. The study’s population consisted of IT executives with cloud-centric roles in 3 large (revenues greater than $5 billion) …


Exploring Strategies For Implementing Information Security Training And Employee Compliance Practices, Alan Robert Dawson 2019 Walden University

Exploring Strategies For Implementing Information Security Training And Employee Compliance Practices, Alan Robert Dawson

Walden Dissertations and Doctoral Studies

Humans are the weakest link in any information security (IS) environment. Research has shown that humans account for more than half of all security incidents in organizations. The purpose of this qualitative case study was to explore the strategies IS managers use to provide training and awareness programs that improve compliance with organizational security policies and reduce the number of security incidents. The population for this study was IS security managers from 2 organizations in Western New York. Information theory and institutional isomorphism were the conceptual frameworks for this study. Data collection was performed using face-to-face interviews with IS managers …


Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr 2019 Walden University

Cybersecurity Policy Development At The State Level: A Case Study Of Middle Tennessee, Daniel Leslie Scherr

Walden Dissertations and Doctoral Studies

Cybersecurity is a growing threat not only to nations, critical infrastructure, and major entities, but also to smaller organizations and individuals. The growing number of successful attacks on all manner of U.S. targets highlights the need for effective and comprehensive policy from the local to federal level, though most research focuses on federal policy issues, not state issues. The purpose of this study was to examine the effectiveness of the decision-making process within the current cybersecurity policy environment in a southern state of the United States. Sabatier's advocacy coalition framework served as the theoretical framework for the study. Data were …


Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson 2019 Walden University

Examination Of Adoption Theory On The Devops Practice Of Continuous Delivery, Andrew John Anderson

Walden Dissertations and Doctoral Studies

Many organizations have difficulty adopting advanced software development practices. Some software development project managers in large organizations are not aligned with the relationship between performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience, with intent to adopt the DevOps practice of continuous delivery. The purpose of this study was to examine the statistical relationships between the independent variables—performance expectancy, effort expectancy, social influence, and facilitating conditions, as moderated by experience—and the dependent variable of behavioral intent to adopt a continuous delivery system. Venkatesh, Morris, Davis, and Davis's unified theory of acceptance and use of technology provided …


Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow 2019 Walden University

Leadership Characteristics In Flexible Information Technology Environments, Chrisilia Bristow

Walden Dissertations and Doctoral Studies

Researchers have found that a positive correlation exists between information technology (IT) flexibility, IT effectiveness, and strategic alignment in organizations. It has been determined that within inflexible IT environments maintainability is reduced and key business factors become at risk. An IT flexibility measurement matrix was developed to assess IT flexibility however leadership characteristics were not identified for measurement with that model. Determining the leadership characteristics needed for IT flexibility was the purpose of this multiple case study. Leveraging the empowerment, situational leadership, IT-business equilibrium, and complexity change theories, the research questions were focused on the leadership characteristics exhibited by organizational …


Strategies To Reduce The Fiscal Impact Of Cyberattacks, Shirley Denise Smith 2019 Walden University

Strategies To Reduce The Fiscal Impact Of Cyberattacks, Shirley Denise Smith

Walden Dissertations and Doctoral Studies

A single cyberattack event involving 1 major corporation can cause severe business and social devastation. In this single case study, a major U.S. airline company was selected for exploration of the strategies information technology administrators and airline managers implemented to reduce the financial devastation that may be caused by a cyberattack. Seven participants, of whom 4 were airline managers and 3 were IT administrators, whose primary responsibility included implementation of strategies to plan for and respond to cyberattacks participated in the data collection process. This study was grounded on the general systems theory. Data collection entailed semistructured face-to-face and telephone …


Perceptions Of Factors That Contribute To Employee Retention Of It Project Managers, Julie Ann Wiebell 2019 Walden University

Perceptions Of Factors That Contribute To Employee Retention Of It Project Managers, Julie Ann Wiebell

Walden Dissertations and Doctoral Studies

The low retention rate of information technology (IT) project managers from a region in the southeastern United States has increased an organization's operational costs and decreased the organization's global competitiveness. The conceptual foundation for this study was the resource-based theory of competitive advantage. This multiple case study explored IT project managers' perceptions of the factors that contributed to their retention. Participants in the study included 10 IT project managers with at least 5 years of experience who were also members of a chapter of the Project Management Institute (PMI). Semistructured interviews were conducted via teleconference to collect data that were …


Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson 2019 Walden University

Knowledge Transfer Strategy Implementation In Contract Organizations, Delano Clyde Hudson

Walden Dissertations and Doctoral Studies

Despite economic perils of government shutdowns, foreclosures, bankruptcies, and employee layoffs, some contract leaders consistently fail to implement knowledge transfer strategies that could improve production and profitability and maintain operational readiness when employees transition in and out of the organization. The conceptual framework for this descriptive research study was Nonaka and Takeuchi's socialization, externalization, combination, and internalization model for knowledge creation. A purposive sample of 20 leaders from 2 contract organizations within the south central United States with at least 10 years of experience in contracting were interviewed. Member checking was used for reliability of the synthesized interviews, and triangulation …


Reducing Errors With Blood Administration Transfusion Systems, Kim D. Stevens 2019 Walden University

Reducing Errors With Blood Administration Transfusion Systems, Kim D. Stevens

Walden Dissertations and Doctoral Studies

The intention of implementing technology into healthcare practices is to reduce opportunity for errors in the delivery of providing health care. However, errors still occur, and many times are preventable. Configurations of health information technology systems should match clinical workflows to promote usage as intended. The purpose of this quality improvement project was to evaluate the impact of revised system configurations and use of a blood product transfusion system for the administration of blood products after one year of implementation. The method of heuristic evaluation is a usability engineering method for finding problems in a user interface design with the …


Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding 2019 Walden University

Use Of Mobile Telephones: Experiences Of First Responders In Rural African Communities, James Harding

Walden Dissertations and Doctoral Studies

Emergency medical technicians (EMTs) usually participate in disaster response in rural African communities. Disasters in African communities are often characterized by huge fatalities, which are associated with a slow pace of response. The use of information and communication technology in disaster response is recognized as an effective conduit for enhancing response. Previous research indicates the efficacy of the use of mobile telephones in disaster response in advance countries. However, there remains a critical gap in the available literature on the experiences of EMTs with the use of mobile telephones in disaster response in rural African communities. The purpose of this …


Research On The Law Of Garlic Price Based On Big Data, Feng Guo, Pingzeng Liu, Chao Zhang, Weijie Chen, Wei Han, Wanming Ren, Yong Zheng, Jianrui Ding 2019 Shandong Agricultural University

Research On The Law Of Garlic Price Based On Big Data, Feng Guo, Pingzeng Liu, Chao Zhang, Weijie Chen, Wei Han, Wanming Ren, Yong Zheng, Jianrui Ding

Computer Science Student Research

In view of the frequent fluctuation of garlic price under the market economy and the current situation of garlic price, the fluctuation of garlic price in the circulation link of garlic industry chain is analyzed, and the application mode of multidisciplinary in the agricultural industry is discussed. On the basis of the big data platform of garlic industry chain, this paper constructs a Garch model to analyze the fluctuation law of garlic price in the circulation link and provides the garlic industry service from the angle of price fluctuation combined with the economic analysis. The research shows that the average …


User-Centered Design Strategies For Clinical Brain-Computer Interface Assistive Technology Devices, Geraldine Light 2019 Walden University

User-Centered Design Strategies For Clinical Brain-Computer Interface Assistive Technology Devices, Geraldine Light

Walden Dissertations and Doctoral Studies

Although in the past 50 years significant advances based on research of brain-computer interface (BCI) technology have occurred, there is a scarcity of BCI assistive technology devices at the consumer level. This multiple case study explored user-centered clinical BCI device design strategies used by computer scientists designing BCI assistive technologies to meet patient-centered outcomes. The population for the study encompassed computer scientists experienced with clinical BCI assistive technology design located in the midwestern, northeastern, and southern regions of the United States, as well as western Europe. The multi-motive information systems continuance model was the conceptual framework for the study. Interview …


Digital Commons powered by bepress